Blog

17 August 2023

Unraveling Bronze Starlight's Enigmatic Cyber Offensive: A Deep Dive into Espionage Tactics

In the digital realm, where technology intertwines with threat, the recent emergence of the Bronze Starlight group has cast a spotlight on the intricate interplay between cyber attackers and their targets. This complex cyber campaign, directed towards the Southeast Asian gambling sector, serves as a testament to the evolving landscape of cyber threats. In this in-depth exploration, we delve into the multifaceted tactics employed by Bronze Starlight, unveiling their espionage motives, dissecting their elaborate operational strategies, and grappling with the challenges of attributing such elusive activities.

Analyzing the Tangled Web of Bronze Starlight's Tactics

To truly comprehend the extent of Bronze Starlight's endeavors, we must embark on a detailed analysis of their operational tactics:

  1. Exploiting Software Weaknesses: The First Move

The core of Bronze Starlight's approach hinges on the meticulous identification of vulnerabilities within widely-utilized software applications. By capitalizing on the shortcomings of platforms like Adobe Creative Cloud, Microsoft Edge, and McAfee VirusScan, the group stealthily integrates a potent malicious element, often referred to as the Cobalt Strike beacon.

  1. Orchestrating Distraction Through Ransomware: The Strategic Deception

What sets Bronze Starlight apart is their strategic diversionary tactic. By deploying ransomware attacks, they create a smokescreen that draws the attention of defenders and stakeholders alike. While the focus is directed towards the ransom threat, the group quietly pursues their true objective: the extraction of valuable data.

Navigating the Intricate Attribution Maze

The task of attributing cyber attacks to specific entities is akin to solving a puzzle shrouded in ambiguity, particularly within the realm of interconnected Chinese nation-state actors. The Bronze Starlight campaign blurs the lines through its association with other notable endeavors, including Operation ChattyGoblin and a supply chain manipulation. This intricate web complicates the process of definitively pinpointing the responsible entity.

Unmasking the Multifaceted Malware Deployment Process

Bronze Starlight's modus operandi is characterized by a meticulously orchestrated malware deployment process:

  1. By manipulating chat application installers, they gain access to a distinctive .NET malware loader.
  2. This loader, in turn, retrieves a secondary ZIP archive stored within Alibaba's repositories.
  3. Concealed within this archive are seemingly benign programs, which harbor vulnerabilities, a malicious DLL (Dynamic Link Library), and an encrypted data file, known as agent.data.

Executing Payloads and Initiating Cobalt Strike Beacons

The group's technical prowess shines during the payload execution phase:

  1. By capitalizing on the vulnerabilities of the executable, Bronze Starlight discreetly loads the malicious DLL.
  2. This DLL is meticulously designed, housing sophisticated code responsible for orchestrating the decryption and activation of concealed content embedded within the encrypted data file.
  3. This intricate process culminates in the deployment of the notorious Cobalt Strike beacons, providing the attackers with remote control over the compromised system.

The Stolen Certificate and Collaborative Ecosystem

Bronze Starlight's activities take a notable turn with the incorporation of a stolen signing key from Ivacy VPN, a Singapore-based entity. This pilfered key enables them to manipulate perceptions of legitimacy concerning their malicious software. Furthermore, the group's utilization of HUI Loader variants, shared tools within the repertoire of China-based groups like APT10, Bronze Starlight, and TA410, highlights the collaborative and symbiotic nature of their operations.

Examples and Evidence:

  1. Exploiting Software Weaknesses:
    • Example: Bronze Starlight has been observed targeting vulnerabilities in widely-used software like Adobe Creative Cloud, Microsoft Edge, and McAfee VirusScan.
    • Evidence: Security researchers have identified instances where Bronze Starlight has leveraged these vulnerabilities to infiltrate systems and deploy malicious components, such as Cobalt Strike beacons.
  2. Orchestrating Distraction Through Ransomware:
    • Example: In previous campaigns, Bronze Starlight deployed short-lived ransomware attacks that caused disruptions and drew attention from security teams and the media.
    • Evidence: Instances of ransomware attacks and the subsequent attention diversion have been documented by cybersecurity firms, showcasing the group's use of diversionary tactics.
  3. Attribution Challenges:
    • Example: The Bronze Starlight campaign shares striking overlaps with the tactics observed in Operation ChattyGoblin, suggesting possible connections to the same threat actor or a collaborative effort.
    • Evidence: Analysis by cybersecurity researchers has revealed similarities in the methods, techniques, and infrastructure used in both campaigns, raising questions about the attribution of these activities.
  4. Unmasking the Multifaceted Malware Deployment Process:
    • Example: During a recent investigation, security experts discovered modified installers for chat applications that carried a .NET malware loader.
    • Evidence: These findings were reported by multiple cybersecurity firms, showcasing the progression of the attackers' tactics from initial access to the deployment of secondary malicious payloads.
  5. Executing Payloads and Initiating Cobalt Strike Beacons:
    • Example: A specific campaign showcased the attackers side-loading a malicious DLL into legitimate executables to initiate the deployment of Cobalt Strike beacons.
    • Evidence: Cybersecurity researchers conducted in-depth analysis of compromised systems, revealing the presence of these malicious DLLs and their role in the deployment of advanced persistent threats.
  6. The Stolen Certificate and Collaborative Ecosystem:
    • Example: Bronze Starlight was found to have used a stolen signing key from a Singapore-based VPN provider to sign their malicious software, indicating a high level of sophistication.
    • Evidence: The certificate revocation by the VPN provider after being notified by cybersecurity researchers confirms the unauthorized use of the certificate.
  7. Shared Tooling and Infrastructure:
    • Example: The deployment of HUI Loader variants in Bronze Starlight's campaigns aligns with the patterns observed in other China-based groups like APT10 and TA410.
    • Evidence: Security analysts have identified code similarities and behavioral overlaps between the campaigns of these different groups, indicating a collaborative sharing of tools and tactics.

Conclusion:

As we conclude our comprehensive exploration of "Unraveling Bronze Starlight's Enigmatic Cyber Offensive: A Deep Dive into Espionage Tactics," it's evident that the digital landscape is fraught with intricate challenges posed by advanced threat actors like Bronze Starlight. The campaign serves as a stark reminder that cybersecurity is an ever-evolving battle where vigilance and preparedness are paramount.

At digiALERT, our commitment to safeguarding digital realms is unwavering. The revelations surrounding Bronze Starlight's tactics underscore the critical importance of staying ahead of evolving cyber threats. By arming ourselves with deep insights into the operational intricacies of such threat groups, we can better anticipate their maneuvers and bolster our defenses.

The collaboration of threat actors, shared infrastructure, and the subtle nuances of deception demand that organizations and individuals alike remain proactive. As we unveil the layers of these enigmatic cyber offenses, it becomes clear that a multi-faceted approach is required: advanced threat intelligence, sophisticated detection systems, and rapid response mechanisms are essential.

Our mission at digiALERT is to empower our clients with the knowledge and tools necessary to navigate this complex landscape. We understand that cybersecurity is not just about defense—it's about preemptive action, informed decision-making, and a commitment to staying ahead of the curve.

In the ever-evolving digital world, where every click and keystroke carries implications, digiALERT is your partner in fortifying your digital boundaries. By shedding light on enigmatic cyber threats like Bronze Starlight, we pave the way for a safer, more secure digital future. Together, we can overcome the challenges posed by these sophisticated threat actors and emerge stronger, more resilient, and better equipped to safeguard the digital realms we inhabit.

 

Read 845 times

Information

digiALERT is a rapidly growing new-age premium cyber security services firm. We are also the trusted cyber security partner for more than 500+ enterprises across the globe. We are headquartered in India, with offices in Santa Clara, Sacremento , Colombo , Kathmandu, etc. We firmly believe as a company, you focus on your core area, while we focus on our core area which is to take care of your cyber security needs.